CVE-2024-5133: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in lunary-ai lunary-ai/lunary
In lunary-ai/lunary version 1.2.4, an account takeover vulnerability exists due to the exposure of password recovery tokens in API responses. Specifically, when a user initiates the password reset process, the recovery token is included in the response of the `GET /v1/users/me/org` endpoint, which lists all users in a team. This allows any authenticated user to capture the recovery token of another user and subsequently change that user's password without consent, effectively taking over the account. The issue lies in the inclusion of the `recovery_token` attribute in the users object returned by the API.
CVE-2024-5133: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in lunary-ai lunary-ai/lunary
Description
In lunary-ai/lunary version 1.2.4, an account takeover vulnerability exists due to the exposure of password recovery tokens in API responses. Specifically, when a user initiates the password reset process, the recovery token is included in the response of the `GET /v1/users/me/org` endpoint, which lists all users in a team. This allows any authenticated user to capture the recovery token of another user and subsequently change that user's password without consent, effectively taking over the account. The issue lies in the inclusion of the `recovery_token` attribute in the users object returned by the API.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- @huntr_ai
- Date Reserved
- 2024-05-19T18:19:36.613Z
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 68ef9b27178f764e1f470c58
Added to database: 10/15/2025, 1:01:27 PM
Last updated: 10/15/2025, 1:01:29 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-5753: CWE-89 Improper Neutralization of Special Elements used in an SQL Command in vanna-ai vanna-ai/vanna
HighCVE-2024-5751: CWE-94 Improper Control of Generation of Code in berriai berriai/litellm
CriticalCVE-2024-5714: CWE-863 Incorrect Authorization in lunary-ai lunary-ai/lunary
HighCVE-2024-5710: CWE-862 Missing Authorization in berriai berriai/litellm
MediumCVE-2024-5569: CWE-835 Loop with Unreachable Exit Condition in jaraco jaraco/zipp
MediumActions
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.